UBM: TECH DIGITAL RESOURCE LIBRARY

Secure Boot Requirements and Capabilities in Embedded Systems

May 20, 2010

Download The No. 1 vulnerability source in embedded processors is the initial boot phase of the device. Solutions to the problem of insecure boot processes vary enormously depending on the protection requirements of the system. Rather than relying on solutions based on product name, engineers will learn to make more informed decisions on how much end-system security they need, and match that to the various secure boot capabilities on the market, according to CPU Technology.


Whitepaper